Home Search

phishing attacks - search results

If you're not happy with the results, please do another search
Cryptocurrency scams in Australia

Hackers Target Australians with Phishing Attacks Amid COVID-19 Crisis

With majority of the employees working remotely, cybercriminals are taking advantage of the ongoing COVID-19 crisis across the globe. Several industry experts stated that...
Phishing Campaign on FINRA

US Healthcare institutions are vulnerable to phishing attacks: Survey

A recent survey revealed that employees at U.S. health care institutions may be susceptible to phishing emails. The report, Assessment of Employee Susceptibility to...
Smishing attacks

Phishing and Ransomware are the top attacks on Financial Firms: Survey

Security researchers stated that Phishing and Ransomware attacks are the most reported types of cyber-attacks on financial services firms. According to the Audit and...
Acronis Cyber Readiness Report, cyberattacks in India, cybercrime in India

Cyberattacks Rise in APAC Region, India Most Targeted

The comprehensive overview of the present cyberthreat landscape has changed drastically, with threat actors leveraging new hacking techniques more often. Besides, the pandemic gave...
Gmail, apt28

Russia-linked APT28 Phishes 14,000 Gmail Users in a State-sponsored Phishing Campaign

APT28, a threat group attributed to Russia's General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS) military unit 26165, is targeting...
credential phishing campaigns

Hackers Targeted Over 75,000 Mailboxes in a Credential Phishing Campaign

Security researchers from Armorblox uncovered an ongoing credential phishing campaign exploiting the brand of email encryption provider Zix. The analysis claim that the campaign...
paying ransom, Conti Ransomware Attacks

Conti Ransomware Attacks on Rise – CISA, FBI, NSA Issue Joint Alert

Increased use of Conti ransomware in more than 400 attacks on the U.S. and international organizations has been observed by the Cybersecurity and Infrastructure...
Credential stuffing attacks

What are Credential Stuffing Attacks and How to Prevent Them

Thwarting cyberattacks has become highly complicated today. Unauthorized intrusions have seen a surge despite security measures implemented by internet users and corporates to safeguard...
Microsoft, Cyberattack on Olympus

Top 10 Common Types of Network Security Attacks Explained

The risk of network security attacks is mounting as businesses transition to a remote work environment and embrace sophisticated technology. The IT (Information Technology) and...
Email Attacks

Email Threats Continue to be Gateway of Major Cyberattacks

Cyberattacks via unsolicited emails remain an effective attack vector as threat actors continue to evolve their phishing techniques. Adversaries are quick to adopt new...

MOST POPULAR

RECENT POSTS